Sciweavers

3228 search results - page 445 / 646
» Computationally Sound Proofs
Sort
View
164
Voted
FOSSACS
2004
Springer
15 years 9 months ago
Polynomials for Proving Termination of Context-Sensitive Rewriting
Abstract. We show how to generate well-founded and stable term orderings based on polynomial interpretations over the real numbers. Monotonicity (another usual requirement in termi...
Salvador Lucas
138
Voted
GECCO
2004
Springer
100views Optimization» more  GECCO 2004»
15 years 9 months ago
Analysis of the (1+1) EA for a Noisy OneMax
Abstract. In practical applications evaluating a fitness function is frequently subject to noise, i. e., the “true fitness” is disturbed by some random variations. Evolutiona...
Stefan Droste
PKC
2004
Springer
112views Cryptology» more  PKC 2004»
15 years 9 months ago
Identity-Based Threshold Decryption
Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Joonsang Baek, Yuliang Zheng
135
Voted
PKC
2004
Springer
150views Cryptology» more  PKC 2004»
15 years 9 months ago
Undeniable Signatures Based on Characters: How to Sign with One Bit
We present a new undeniable signature scheme which is based on the computation of characters. Our signature scheme offers the advantage of having an arbitrarily short signature. I...
Jean Monnerat, Serge Vaudenay
87
Voted
DATE
2003
IEEE
81views Hardware» more  DATE 2003»
15 years 8 months ago
Equisolvability of Series vs. Controller's Topology in Synchronous Language Equations
Given a plant Å and a specification Å , the largest solution of the FSM equation Å ¯ Å Å contains all possible discrete controllers Å . Often we are interested in computin...
Nina Yevtushenko, Tiziano Villa, Robert K. Brayton...